We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is a Zombie Computer?

By R. Kayne
Updated: May 16, 2024
Views: 21,598
Share

A zombie computer, or “drone,” is a computer that has been secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely. When the zombie computer connects to the Internet the remote hacker can clandestinely make contact with the computer to mine data from it or use it for any number of purposes. Communication between the hacker and the computer travels through back channels of the targeted system, keeping these processes hidden from the owner.

The hacking tools used to establish hidden control in a remote computer are referred to as a rootkit. A rootkit isn’t considered malware, as there are legitimate uses for rootkits in networking. However, rootkits can also be used to target random computers on the Internet. Once a computer picks up a rootkit, it becomes an “unwilling accomplice” of the hacker, blindly following instructions, leading to the name “zombie computer.”

A hacker has full access to data and resources on a zombie computer. The infiltrator can copy, infect, corrupt or even erase the entire hard drive. He or she can also install tools that will report everything typed into the zombie computer, including usernames, passwords and financial data like credit card numbers and bank accounts. This private information can be used to commit fraud, identity theft, or can be sold or traded to others.

In addition to the personal violation of privacy and inherent dangers that brings, the perpetrator can also use the zombie computer to engage in illegal online activities. A hacker that compromises many computers can combine them into a zombie network, called a “botnet.” The hacker can control the zombies by broadcasting single commands, negating the need to communicate with each target individually. The botnet becomes a kind of army to do the hacker’s bidding. Botnets are used to send spam, attack websites, perpetuate phishing scams, commit click-fraud, and grow larger botnets by infecting new computers that are vulnerable to attack.

Unfortunately, the risk of your system falling victim to a zombie computer attack might be greater than you imagine. In highly publicized reports from 2005, one dismantled botnet controlled by three young men in the Netherlands included 1.5 million zombie computers. In the United States teenagers termed “script kiddies” are competitively building botnets to gain peer recognition, and in 2000, a Canadian 15-year-old boy used zombie drones to bring down several large websites, causing $1.7 million US Dollars in damages.

To minimize the growing threat of becoming assimilated into a drone:

  • Keep your anti-spyware and anti-virus software current.
  • Use a firewall.
  • Delete spam without opening it.
  • Avoid installing programs from untrusted sources.
  • Don’t allow untrusted websites to install software.
  • Keep your operating system and Web browser current with the latest hotfixes.
  • Use a good anti-rootkit program weekly to scan for rootkits.
  • Back up your system each week after a clean scan.

In many cases there is excellent freeware available to help you with these tasks. By taking these precautions you will greatly reduce the chances of being targeted by a botnet or zombie computer scanning for new drones.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
By Markerrag — On Jan 26, 2014

A few years ago, we had a computer turned into a zombie and the blasted thing was spamming email all over the place. We're still not sure how the computer got infected, but wound up having to pretty well format the hard drive and start over.

Once a computer gets the zombie treatment, it's hard to fix.

Share
https://www.easytechjunkie.com/what-is-a-zombie-computer.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.